US6128738A - Certificate based security in SNA data flows - Google Patents

Certificate based security in SNA data flows Download PDF

Info

Publication number
US6128738A
US6128738A US09/064,632 US6463298A US6128738A US 6128738 A US6128738 A US 6128738A US 6463298 A US6463298 A US 6463298A US 6128738 A US6128738 A US 6128738A
Authority
US
United States
Prior art keywords
session
token
user
certificate
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US09/064,632
Inventor
Ronald Patrick Doyle
John Raithel Hind
Julie Hayes King
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US09/064,632 priority Critical patent/US6128738A/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HIND, JOHN RAITHEL, DOYLE, RONALD PATRICK, KING, JULIE HAYES
Application granted granted Critical
Publication of US6128738A publication Critical patent/US6128738A/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management

Definitions

  • a typical business user has several user identifiers and passwords that they are responsible for. For example, a business user might have a user id and password to gain access to their workstation, another user id and password to gain access to a terminal emulator, another pair to gain access to their electronic mail, yet another user id and password to gain access to their calendaring functions and still a different pair for certain applications.
  • An additional method is to use a trusted third party to authenticate users and to have all of the users authenticated through this trusted third party.
  • a trusted third party to authenticate users and to have all of the users authenticated through this trusted third party.
  • Two overviews of the current state of the art for single sign-on products utilizing trusted third parties are HP and Partners Collaborate on Presidium/Single Sign-on: Single Log-in Solution Simplifies and Safeguards User Log-in for UNIX System, NT, MVS and other Platforms; Deloitte & Touche, DunaSoft, Entrust Technologies, Gradient, Sybase and Texis Instruments part of Presidium Solution; Jan.
  • the present invention allows a single client certificate to be used across multiple systems when SNA (systems network architecture) is part of the transport between the client and the host or server system. It enables a unique security packet to be generated, that cannot be reused by others, wherein the security packet allows a certificate to be passed in the SNA flows for the authentication of a user.
  • a certificate is an electronic statement of identity that allows building of a trust relationship between parties wishing to exchange information using a preexisting trust relationship that each of the parties has with a third party.
  • the present invention is applicable to both a two tier environment where an SNA client is talking through the network to an SNA host or in a multi-tier environment where the client accesses one or more middle tier servers to gain access to the SNA host.
  • the present invention enables certificate based authentication without the requirement of an active trusted third party.
  • An object of the present invention is to enable the use of public key technology to provide secure access over SNA sessions thereby reducing the user id/password requirements for access to secure applications.
  • Yet another object of the present invention is to enable secure access over SNA using public key technology in a three tier configuration where traffic flows from the workstation, through a gateway, to the host.
  • FIG. 1 is a flow diagram of the current sign-on and validation in a SNA environment (Prior Art).
  • FIG. 2 is a flow chart depicting the sign-on validation in a three tier embodiment of the present invention.
  • FIG. 3 is a flow diagram of the user validation of the present invention.
  • FIG. 4 is a pictorial representation of the prior art user id and password verification through an SNA network.
  • FIG. 5 is a pictorial representation of the two tier authentication of the present invention.
  • FIG. 6 is a pictorial representation of the three tier authentication of the present invention.
  • FIG. 7 is an exemplary layout of an SNA security packet of the present invention.
  • the present invention provides a method, system and program product for integrating the security requirements of SNA sessions with additional security mechanisms to enable a user to reduce the number of security credentials that must be managed without introducing the overhead of additional password management. This is done by using public key technology as a replacement for the current user id and password requirement in SNA communications.
  • the present invention also takes advantage of the move toward using certificates for providing a global identity.
  • the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code means embodied in the medium. Any suitable computer readable medium may be utilized including hard disks, CD-ROMs, optical storage devices, magnetic storage devices, or computer memory.
  • the preferred embodiment of the present invention centers on the creation of a security packet at either the client in the 2-tier case or the middle tier server in the 3-tier case.
  • the security packet contains the X.509 certificate (as will be obvious to those skilled in the art, any commonly accepted certificate could be used but the X.509 certificate is the industry standard) of the user which is used by the host as a replacement for the user id and a digital signature which is used by the host as a replacement for the password.
  • the key elements to ensuring the security of the system are a method of preventing replay of the SNA session containing the packet without introducing a handshake type protocol in addition to a packet format that does not require host understanding of the tiers or layers of its SNA session partner.
  • the basic concept and benefit of using certificates and public key encryption is that there exist algorithms in which certain key pairs allow a message to be encrypted with one key and decrypted with a different key. For example, two users A and B each have a public key which is known to everyone and a private key, which only they know. If A wants to send B a secure message, A would encrypt the message using this algorithm and B's public key. In this case B would be the only one who could read the message since B's private key is required for the decryption and only B knows his private key. Therefore A can send B a secure message without requiring a third party to get involved for security verification.
  • a preferred embodiment of the present invention would be that of a user running through an emulator, over an SNA network to a host system where the user was attempting to execute a host application such as TSO.
  • the user utilizes their emulator 401 and submits a logon request to the host through the SNA stack 403.
  • the user provides their TSO user id and their TSO password with the logon request.
  • This user id and password are sent across the SNA network 405 from the emulator 401 to RACF 411 for password verification. If RACF 411 verifies the user id and password, then the user is allowed to execute the TSO 409 commands.
  • the user logs on to the emulator 501.
  • the user chooses their certificate from their certificate key ring 503.
  • the key ring may be accessed through the well known crypto framework or other provided security services.
  • the emulator creates an encrypted security packet 505 containing a certificate, a token, a token signature and the certificate chain of the signer.
  • the signature is created using the end-user's private key.
  • the token within the packet contains the end users X.509 personal certificate, a time/date stamp, plus the SNA session ID on which the packet will be transmitted. Incorporating the SNA session ID into the packet ensures that a person monitoring or tracing the communication could not reuse the security packet to gain access to the information. If an intruder would attempt to reuse the security packet, the session ID would not be correct and the access attempt would fail.
  • the time/date stamp further limits the use of the security packet and provides additional audit information should the administrator choose to log connection events.
  • the token signature of the preferred embodiment is an X.509 signature algorithm type code (for example RSA+MD5, RSA+SHA, or DSS which are well known in the art).
  • X.509 signature algorithm type code for example RSA+MD5, RSA+SHA, or DSS which are well known in the art.
  • a second embodiment of the present invention is a three-tier embodiment where the user accesses the SNA network through an IP/SNA gateway. This is depicted in FIG. 6.
  • a user at a remote system 607 accesses a secure host application such as TSO 631 or CICS 637 by going from the remote system 607, through an IP network 613 to a gateway system 615.
  • the path 611 through the IP network 613 which the information takes in traveling from the user to the gateway utilizes Secure Sockets Layer (layer) which provides compression, encryption and public key authentication so that the information sent across this channel is secure from tampering or tracing by unauthorized users.
  • layer Secure Sockets Layer
  • the application managing the communication creates the security packet 609 of the previous embodiment.
  • the security packet of the three-tier embodiment contains the same information as that of the two-tier embodiment except in the two-tier embodiment the token is signed by the end user's private key and in the three-tier embodiment the token is signed by the private key of the application which retrieved the certificate.
  • the information next travels from the gateway 615 through an SNA network 627 to the host computer 633.
  • VTAM 629 receives the information, verifies the signature and verifies that the session ID encrypted within the token is the same as the session id from which the token came. If it is, then VTAM passes information such as the certificate to RACF 635 for verification.
  • RACF 635 determines the packet signer was a trusted delegate then it knows that the user certificate was validated at the mid-tier (SSL in this case) and then the user is allowed to access the secure applications such as TSO 631 or CICS 637. If RACF 635 determines that the certificate is not from a trusted party then the session is rejected.
  • FIG. 2 depicts a flow chart of the three-tier authentication of FIG. 6.
  • the user obtains a certificate which, along with their private key, is saved on a personal key-ring that is available to the client emulator (and its SSL implementation). Ideally this is the same certificate and key-ring used by the browser, e-mail client, file/print redirectors and other secure applications to identify the user to a server.
  • the user requests a secure session.
  • the emulator requests, at 205, SSL/TLS mutual authentication to be used in building the TN session with the communications server. Once the SSL/TLS process succeeds in establishing a channel to the communications server, the user's certificate is available to the intermediate server and the server can trust the value therein.
  • the server uses the user's certificate and creates a security packet for the SNA session between itself and the host.
  • the intermediate server is assuring the host that the user certificate was derived from an SSL/TLS channel whose server side library used a signer's key-ring which contained only certificate authorities which the host trusts. This means that the delegation of authentication responsibility to the communications server is represented by the configured content of the signer's key-ring and the assurance that the server software will use the information via SSL/TLS to validate the user's certificate submission.
  • the host receives the security packet, at 211 a verification is done to ensure that the session id included in the token matches the session id that the packet arrived on. If the verification fails, the session is terminated 219.
  • FIG. 1 is an example of the high level flows that travel between the client and the host in the prior art.
  • FIG. 3 is an example of the high level flows that travel between the client and the host in a preferred embodiment of the present invention.
  • the client initiates the session with the host by sending a NOTIFY (ENABLED) 101 to VTAM on the host.
  • the VTAM host responds by sending a USSMSG10 103 to the client.
  • the client completes the screen sent down as USSMSG10 which contains a host application selection 105 and transmits it to the host.
  • the host receives the information about which host application is selected, the host application provides the information and a bind request 107 is sent from the host to the client.
  • the client responds with a bind response 109.
  • the host application then initiates the sending of a logon screen 111 to the client.
  • the logon screen is sent as a 3270 data stream.
  • the client then responds by providing the user id and password 113 and transmitting that information to the host for authentication.
  • the user id and password are then sent by the host applications to the host access control application (such as RACF) 115.
  • the host access control next authenticates the user id/password pair 117 and returns information to the host application.
  • the logon is complete and application data begins to flow 119 between the client and the host application. This happens for each secure application which the client attempts communication with.
  • the client initiates the session with the host by sending a NOTIFY (ENABLED, CERTIFICATE CAPABLE) 301 to VTAM on the host which requests the connection and indicates to the VTAM host that the client can provide a certificate for authentication.
  • the VTAM host responds by sending a USSMSG10 303 to the client.
  • the client completes the screen sent down as USSMSG10 which contains a host application selection 305 and transmits it to the host.
  • the host receives the information about which host application is selected, the host application provides the information and a bind request 307 is sent from the host to the client.
  • the client responds with a bind response 309.
  • the host application then sends a request to the client for their certificate 311.
  • the request for the client's certificate is sent as a 3270 data stream.
  • the client then responds by creating the security packet as previously described and sending the security packet to the host 313 for authentication.
  • the host application forwards the client's certificate to a host access control 315 such as RACF.
  • the host access control returns a response to the host application 317.
  • the logon is complete and application data begins to flow 319 between the client and the host application.
  • FIG. 7 depicts the layout of the SNA security packet in the preferred embodiment.
  • First the client certificate 703, the time and date stamp 705 and the SNA session id 707 for the session upon which the packets will be transmitted are compiled into a message 701.
  • This message is then signed using a signing algorithm and the signer's private key 709.
  • the application would hash the message (a digest generated by passing the message through a one-way cryptographic function) into a relatively short bit string using a security algorithm such as SHA, MD2, MD4 or MD5.
  • the application would then encrypt the hashing using the signer's private key with the public key algorithm.
  • the resulting signature 713 would then be attached to the rest of the message.
  • the rest of the message contains the algorithm id 711 for the algorithm used and the series of certificates 715 of the signers and the authenticating certificate authorities. Note that the user and signer are not the same in a three-tier environment which is why the signer's certificate is included.
  • the certificate authority (CA) certificate is used to verify that the signer's certificate has not been modified (the CA is the signer of the signer's certificate). This verification proceeds until a CA certificate is found that is known to the receiving system by some other means (such as being defined by an administrator).
  • the signature algorithm is a description of the kind of digest and the kind of encryption being used.
  • the SNA security packet is then transmitted to the host.
  • the present invention allows a single, well recognized certificate to access secure applications without the requirement of having a connected trusted third party for verification of authority.
  • the preferred embodiment shows the application of this method to SNA logical unit (LU) types 0-2 using 3270 data streams.
  • This method is not limited to LU types 0-2 and applies equally to SNA LU 6.2 communications.
  • the security packet is sent rather than the userid/password.
  • the LU6.2 ATTACH command would indicate support for certificate security, and the previously described packet would be sent following the ATTACH (and subsequent program initialization data, if any).
  • the receiving SNA systems would again perform checks to ensure the packet arrived on the session matching the session id in the packet as in the previous description.

Abstract

A method and system for enabling the use of a single client certificate to be used in SNA communications to ensure security such that the certificate cannot be intercepted and reused yet still allowing the use of a single certificate for multiple applications. This avoids the need for a connected trusted third party or a multiplicity of user id and password pairs.

Description

BACKGROUND OF THE INVENTION
Throughout the history of the computing industry security has been a significant issue. Most computer systems employ a user id and password type of verification of a user so that the user can access data within a computer while maintaining a secure environment for computing. The growth in the computer industry and in the amount of information accessible through a computer has also created a proliferation of password requirements. A typical business user has several user identifiers and passwords that they are responsible for. For example, a business user might have a user id and password to gain access to their workstation, another user id and password to gain access to a terminal emulator, another pair to gain access to their electronic mail, yet another user id and password to gain access to their calendaring functions and still a different pair for certain applications. In many instances these passwords are set with expiration dates to improve security which means that each of the passwords will have rules for creating the password (such as 5 alphanumeric characters with the second character being numeric) and set expiration dates (such as 30 days, 45 days or 60 days). This configuration of computer networking quickly becomes unmanageable since it is extremely difficult to keep all passwords and user ids synchronized, hence many users resort to writing their user ids and passwords on a piece of paper, somewhat eliminating the security benefit intended by the passwords to begin with. Even a personal user of a computer network may be faced with an excess of user id and password requirements such as the user id and password for their Internet provider, one for their mail, another for their travel agent and yet others for each of the bulletin boards to which they subscribe.
A need has arisen in both business and non-business computer use for single sign-on types of products. These products are becoming available in the marketplace today. Most of the products keep a list of all the Ids and map the user from one "single" sign-on to the appropriate user id/password pair for their destination, so that the user id/password changes in the data stream transparently to the user. However, this approach requires significant administrative effort to prime the database with the correct user id/password pairs and requires synchronization of the password databases as passwords change or expire.
An additional method is to use a trusted third party to authenticate users and to have all of the users authenticated through this trusted third party. Two overviews of the current state of the art for single sign-on products utilizing trusted third parties are HP and Partners Collaborate on Presidium/Single Sign-on: Single Log-in Solution Simplifies and Safeguards User Log-in for UNIX System, NT, MVS and other Platforms; Deloitte & Touche, DunaSoft, Entrust Technologies, Gradient, Sybase and Texis Instruments part of Presidium Solution; Jan. 27, 1997 found on the world wide web at http://www.hp.com/csopress/97jan27b.html and Open Horizon's White Paper entitled Secure Single Sign-On found on the world wide web at http://www.openhorizon.com/html/sssowp.html.
The above solutions allow for a single sign-on for certain applications but require a trusted third party to be connected or a non-public key token which must be handled on the target system.
SUMMARY OF THE INVENTION
The present invention allows a single client certificate to be used across multiple systems when SNA (systems network architecture) is part of the transport between the client and the host or server system. It enables a unique security packet to be generated, that cannot be reused by others, wherein the security packet allows a certificate to be passed in the SNA flows for the authentication of a user. A certificate is an electronic statement of identity that allows building of a trust relationship between parties wishing to exchange information using a preexisting trust relationship that each of the parties has with a third party. The present invention is applicable to both a two tier environment where an SNA client is talking through the network to an SNA host or in a multi-tier environment where the client accesses one or more middle tier servers to gain access to the SNA host. The present invention enables certificate based authentication without the requirement of an active trusted third party.
OBJECTS OF THE INVENTION
An object of the present invention is to enable the use of public key technology to provide secure access over SNA sessions thereby reducing the user id/password requirements for access to secure applications.
Yet another object of the present invention is to enable secure access over SNA using public key technology in a three tier configuration where traffic flows from the workstation, through a gateway, to the host.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a flow diagram of the current sign-on and validation in a SNA environment (Prior Art).
FIG. 2 is a flow chart depicting the sign-on validation in a three tier embodiment of the present invention.
FIG. 3 is a flow diagram of the user validation of the present invention.
FIG. 4 is a pictorial representation of the prior art user id and password verification through an SNA network.
FIG. 5 is a pictorial representation of the two tier authentication of the present invention.
FIG. 6 is a pictorial representation of the three tier authentication of the present invention.
FIG. 7 is an exemplary layout of an SNA security packet of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention provides a method, system and program product for integrating the security requirements of SNA sessions with additional security mechanisms to enable a user to reduce the number of security credentials that must be managed without introducing the overhead of additional password management. This is done by using public key technology as a replacement for the current user id and password requirement in SNA communications. The present invention also takes advantage of the move toward using certificates for providing a global identity.
The present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code means embodied in the medium. Any suitable computer readable medium may be utilized including hard disks, CD-ROMs, optical storage devices, magnetic storage devices, or computer memory.
The preferred embodiment of the present invention centers on the creation of a security packet at either the client in the 2-tier case or the middle tier server in the 3-tier case. The security packet contains the X.509 certificate (as will be obvious to those skilled in the art, any commonly accepted certificate could be used but the X.509 certificate is the industry standard) of the user which is used by the host as a replacement for the user id and a digital signature which is used by the host as a replacement for the password. The key elements to ensuring the security of the system are a method of preventing replay of the SNA session containing the packet without introducing a handshake type protocol in addition to a packet format that does not require host understanding of the tiers or layers of its SNA session partner.
The basic concept and benefit of using certificates and public key encryption is that there exist algorithms in which certain key pairs allow a message to be encrypted with one key and decrypted with a different key. For example, two users A and B each have a public key which is known to everyone and a private key, which only they know. If A wants to send B a secure message, A would encrypt the message using this algorithm and B's public key. In this case B would be the only one who could read the message since B's private key is required for the decryption and only B knows his private key. Therefore A can send B a secure message without requiring a third party to get involved for security verification.
A preferred embodiment of the present invention would be that of a user running through an emulator, over an SNA network to a host system where the user was attempting to execute a host application such as TSO. In the current art, as shown in FIG. 4, the user utilizes their emulator 401 and submits a logon request to the host through the SNA stack 403. The user provides their TSO user id and their TSO password with the logon request. This user id and password are sent across the SNA network 405 from the emulator 401 to RACF 411 for password verification. If RACF 411 verifies the user id and password, then the user is allowed to execute the TSO 409 commands. If that same user wants to execute CICS 413 commands, they are required to provide their CICS user id and their CICS password, have those passwords verified by RACF 411, then they are allowed to execute CICS 413 commands over that session. Utilizing the present invention as depicted by FIG. 5, the user logs on to the emulator 501. When the user logs on to the emulator 501, the user chooses their certificate from their certificate key ring 503. The key ring may be accessed through the well known crypto framework or other provided security services. When the user proceeds to access TSO 513, the emulator creates an encrypted security packet 505 containing a certificate, a token, a token signature and the certificate chain of the signer. In the two-tier example being presented, the signature is created using the end-user's private key. The token within the packet contains the end users X.509 personal certificate, a time/date stamp, plus the SNA session ID on which the packet will be transmitted. Incorporating the SNA session ID into the packet ensures that a person monitoring or tracing the communication could not reuse the security packet to gain access to the information. If an intruder would attempt to reuse the security packet, the session ID would not be correct and the access attempt would fail. The time/date stamp further limits the use of the security packet and provides additional audit information should the administrator choose to log connection events. The token signature of the preferred embodiment is an X.509 signature algorithm type code (for example RSA+MD5, RSA+SHA, or DSS which are well known in the art). Once the security packet is created it is passed through the SNA stack 507 to the SNA network 509 along with the request to access TSO 513. On the receiving side of the SNA network 509, VTAM 511 retrieves the packet, verifies the signature and checks the session ID to ensure that the packet is not from an unauthorized source. If the session ID is for the session upon which the packet was received, then VTAM passes the information to RACF 515 for verification of the authority of the user. If the user requesting access has the appropriate credentials (ie. RACF trusts the signer) then RACF 515 approves the access to the resources allowed for the stated certificate and the user is permitted to execute the TSO 513 commands; otherwise the request is rejected.
This same series of steps occurs when the user attempts to access CICS 517 or any other secure system on the remote host, but RACF 515, under the present invention is looking at the same user certificate information rather than, in the prior art, having the user utilize a different user id and password for each of the secure systems which the user desired to access.
A second embodiment of the present invention is a three-tier embodiment where the user accesses the SNA network through an IP/SNA gateway. This is depicted in FIG. 6. In the embodiment of FIG. 6, a user at a remote system 607 accesses a secure host application such as TSO 631 or CICS 637 by going from the remote system 607, through an IP network 613 to a gateway system 615. The path 611 through the IP network 613 which the information takes in traveling from the user to the gateway utilizes Secure Sockets Layer (layer) which provides compression, encryption and public key authentication so that the information sent across this channel is secure from tampering or tracing by unauthorized users. In the gateway, the application managing the communication (such as the telnet server 625) creates the security packet 609 of the previous embodiment. The security packet of the three-tier embodiment contains the same information as that of the two-tier embodiment except in the two-tier embodiment the token is signed by the end user's private key and in the three-tier embodiment the token is signed by the private key of the application which retrieved the certificate. The information next travels from the gateway 615 through an SNA network 627 to the host computer 633. At the host computer 633 VTAM 629 receives the information, verifies the signature and verifies that the session ID encrypted within the token is the same as the session id from which the token came. If it is, then VTAM passes information such as the certificate to RACF 635 for verification. If RACF 635 determines the packet signer was a trusted delegate then it knows that the user certificate was validated at the mid-tier (SSL in this case) and then the user is allowed to access the secure applications such as TSO 631 or CICS 637. If RACF 635 determines that the certificate is not from a trusted party then the session is rejected.
FIG. 2 depicts a flow chart of the three-tier authentication of FIG. 6. At 201 the user obtains a certificate which, along with their private key, is saved on a personal key-ring that is available to the client emulator (and its SSL implementation). Ideally this is the same certificate and key-ring used by the browser, e-mail client, file/print redirectors and other secure applications to identify the user to a server. At 203 the user requests a secure session. The emulator requests, at 205, SSL/TLS mutual authentication to be used in building the TN session with the communications server. Once the SSL/TLS process succeeds in establishing a channel to the communications server, the user's certificate is available to the intermediate server and the server can trust the value therein. At 207, the server uses the user's certificate and creates a security packet for the SNA session between itself and the host. In doing so, the intermediate server is assuring the host that the user certificate was derived from an SSL/TLS channel whose server side library used a signer's key-ring which contained only certificate authorities which the host trusts. This means that the delegation of authentication responsibility to the communications server is represented by the configured content of the signer's key-ring and the assurance that the server software will use the information via SSL/TLS to validate the user's certificate submission. At 209 the host receives the security packet, at 211 a verification is done to ensure that the session id included in the token matches the session id that the packet arrived on. If the verification fails, the session is terminated 219. If the session ids match, then at 213 a check is made to validate the token signature using the algorithm indicated to verify that the token has not been tampered with. Methods of determining tampering are well known in the art and are not unique or pertinent to the present invention, therefore they will not be discussed further at this point. If the token shows evidence of tampering the session is terminated 219. If the session has not been tampered with then at 215 the host verifies via the certificate chain that it trusts the signer. If the signer's certificate is not the certificate in the token, the host verifies that the signer is in the delegation list of those trusted to enforce the authentication rules. If the signer is not trusted then the session is terminated 219, otherwise access is permitted 217.
As for the flows that actually travel between the client and the host, FIG. 1 is an example of the high level flows that travel between the client and the host in the prior art. FIG. 3 is an example of the high level flows that travel between the client and the host in a preferred embodiment of the present invention.
In FIG. 1 the client initiates the session with the host by sending a NOTIFY (ENABLED) 101 to VTAM on the host. The VTAM host responds by sending a USSMSG10 103 to the client. The client completes the screen sent down as USSMSG10 which contains a host application selection 105 and transmits it to the host. When the host receives the information about which host application is selected, the host application provides the information and a bind request 107 is sent from the host to the client. The client responds with a bind response 109. The host application then initiates the sending of a logon screen 111 to the client. In the prior art, the logon screen is sent as a 3270 data stream. The client then responds by providing the user id and password 113 and transmitting that information to the host for authentication. The user id and password are then sent by the host applications to the host access control application (such as RACF) 115. The host access control next authenticates the user id/password pair 117 and returns information to the host application. At that point, the logon is complete and application data begins to flow 119 between the client and the host application. This happens for each secure application which the client attempts communication with.
In FIG. 3 the client initiates the session with the host by sending a NOTIFY (ENABLED, CERTIFICATE CAPABLE) 301 to VTAM on the host which requests the connection and indicates to the VTAM host that the client can provide a certificate for authentication. The VTAM host responds by sending a USSMSG10 303 to the client. The client completes the screen sent down as USSMSG10 which contains a host application selection 305 and transmits it to the host. When the host receives the information about which host application is selected, the host application provides the information and a bind request 307 is sent from the host to the client. The client responds with a bind response 309. The host application then sends a request to the client for their certificate 311. In the preferred embodiment, the request for the client's certificate is sent as a 3270 data stream. The client then responds by creating the security packet as previously described and sending the security packet to the host 313 for authentication. The host application forwards the client's certificate to a host access control 315 such as RACF. The host access control returns a response to the host application 317. At that point, the logon is complete and application data begins to flow 319 between the client and the host application.
FIG. 7 depicts the layout of the SNA security packet in the preferred embodiment. First the client certificate 703, the time and date stamp 705 and the SNA session id 707 for the session upon which the packets will be transmitted are compiled into a message 701. This message is then signed using a signing algorithm and the signer's private key 709. To sign the message, the application would hash the message (a digest generated by passing the message through a one-way cryptographic function) into a relatively short bit string using a security algorithm such as SHA, MD2, MD4 or MD5. The application would then encrypt the hashing using the signer's private key with the public key algorithm. The resulting signature 713 would then be attached to the rest of the message. The rest of the message contains the algorithm id 711 for the algorithm used and the series of certificates 715 of the signers and the authenticating certificate authorities. Note that the user and signer are not the same in a three-tier environment which is why the signer's certificate is included. The certificate authority (CA) certificate is used to verify that the signer's certificate has not been modified (the CA is the signer of the signer's certificate). This verification proceeds until a CA certificate is found that is known to the receiving system by some other means (such as being defined by an administrator). Note that the signature algorithm is a description of the kind of digest and the kind of encryption being used. The SNA security packet is then transmitted to the host.
The present invention allows a single, well recognized certificate to access secure applications without the requirement of having a connected trusted third party for verification of authority.
The preferred embodiment shows the application of this method to SNA logical unit (LU) types 0-2 using 3270 data streams. This method is not limited to LU types 0-2 and applies equally to SNA LU 6.2 communications. For supporting LU 6.2, the security packet is sent rather than the userid/password. The LU6.2 ATTACH command would indicate support for certificate security, and the previously described packet would be sent following the ATTACH (and subsequent program initialization data, if any). The receiving SNA systems would again perform checks to ensure the packet arrived on the session matching the session id in the packet as in the previous description.

Claims (5)

What is claimed is:
1. A computer program for execution on a first computer system having a communications session established with one or more second computer systems, said computer program comprising the steps of:
a first subprocess for identifying a token and a token signature for a computer user having a certificate;
a second subprocess for identifying a certificate chain for said computer user;
a third subprocess for creating a communications packet having at least said token, said token signature and said certificate chain;
a fourth subprocess for sending said communications packet across said communications session from said first computer to said one or more second computer systems; and
a fifth subprocess wherein said one or more second computer systems verify the authority of said user to access data on said one or more second computer systems using said communications packet wherein said token comprises said computer user's certificate plus said session identifier for the session on which said packet will be transmitted.
2. A method for controlling access by a client to one or more host applications, said one or more host applications residing on one or more hosts, said method comprising the steps of:
creating a token representing said client, said token comprising at least a client certificate and a session id;
signing said token using a signer's private key;
sending said token over a session with said one or more host applications, said session having a session id, wherein said one or more hosts receive said token, verify said signature on said token, and verify said session id within said token is the same as the session id for the session upon which the token was received and rejecting the session if the session id was not for the session upon which the token was received.
3. A method as claimed in claim 2 wherein an intermediate TCP/IP network resides between the client and the one or more hosts.
4. In a computer system, an apparatus for controlling access by a client to one or more host applications, said one or more host applications residing on one or more hosts, said apparatus comprising:
means for creating a token representing said client, said token comprising at least a client certificate and a session id;
means for signing said token using a signer's private key;
means for sending said token over a session with said one or more host applications, said session having a session id, wherein said one or more hosts receive said token, verify said signature on said token, and verify said session id within said token is the same as the session id for the session upon which the token was received, rejecting the session if the session id was not for the session upon which the token was received.
5. An apparatus as claimed in claim 4 wherein an intermediate TCP/IP network resides between the client and the one or more hosts.
US09/064,632 1998-04-22 1998-04-22 Certificate based security in SNA data flows Expired - Fee Related US6128738A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/064,632 US6128738A (en) 1998-04-22 1998-04-22 Certificate based security in SNA data flows

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/064,632 US6128738A (en) 1998-04-22 1998-04-22 Certificate based security in SNA data flows

Publications (1)

Publication Number Publication Date
US6128738A true US6128738A (en) 2000-10-03

Family

ID=22057267

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/064,632 Expired - Fee Related US6128738A (en) 1998-04-22 1998-04-22 Certificate based security in SNA data flows

Country Status (1)

Country Link
US (1) US6128738A (en)

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020010861A1 (en) * 2000-04-26 2002-01-24 Shinako Matsuyama Access control system, access control method, device, access control server, access-control-server registration server, data processing apparatus, and program storage medium
US20020032860A1 (en) * 1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature
US20020049605A1 (en) * 2000-05-17 2002-04-25 Nec Electronic business transaction system including server device, client device and connecting terminal used therein
US20020059531A1 (en) * 2000-11-16 2002-05-16 Lai On Warren Kwan Integrated tracking of multi-authentication among web services
US6401211B1 (en) 1999-10-19 2002-06-04 Microsoft Corporation System and method of user logon in combination with user authentication for network access
US20020073257A1 (en) * 2000-12-07 2002-06-13 Ibm Corporation Transferring foreign protocols across a system area network
US20020095584A1 (en) * 2001-01-12 2002-07-18 Royer Barry Lynn System and user interface supporting concurrent application initiation and interoperability
US20020103909A1 (en) * 2001-01-31 2002-08-01 Devine Wesley Mcmillan Methods, systems and computer program products for resuming SNA application-client communications after loss of an IP network connection
US6438550B1 (en) * 1998-12-10 2002-08-20 International Business Machines Corporation Method and apparatus for client authentication and application configuration via smart cards
US20030051157A1 (en) * 2001-09-07 2003-03-13 Nguyen Bing Quang Method and apparatus for selective disabling of tracking of click stream data
US20030159029A1 (en) * 2000-08-25 2003-08-21 Brown Michael S. System and method for implementing an enhanced transport layer security protocol
US20040054898A1 (en) * 2002-08-28 2004-03-18 International Business Machines Corporation Authenticating and communicating verifiable authorization between disparate network domains
US20040168056A1 (en) * 2003-02-26 2004-08-26 Microsoft Corporation Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority
US6785729B1 (en) * 2000-08-25 2004-08-31 International Business Machines Corporation System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful
US6826603B1 (en) * 1999-07-01 2004-11-30 International Business Machines Corporation Method and system for automatically configuring Telnet 3270 clients in an internet protocol network
US20040268152A1 (en) * 2003-06-27 2004-12-30 Wrq, Inc. Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
US20050005133A1 (en) * 2003-04-24 2005-01-06 Xia Sharon Hong Proxy server security token authorization
US20050033957A1 (en) * 2003-06-25 2005-02-10 Tomoaki Enokida Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
US20050039008A1 (en) * 2003-08-05 2005-02-17 Gaurav Bhatia Method and apparatus for end-to-end identity propagation
US6865671B1 (en) * 2000-04-07 2005-03-08 Sendmail, Inc. Electronic mail system with authentication methodology for supporting relaying in a message transfer agent
US20050177715A1 (en) * 2004-02-09 2005-08-11 Microsoft Corporation Method and system for managing identities in a peer-to-peer networking environment
US20050183138A1 (en) * 2004-02-13 2005-08-18 Microsoft Corporation System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
US20050182949A1 (en) * 2004-02-13 2005-08-18 Microsoft Corporation System and method for securing a computer system connected to a network from attacks
US6934706B1 (en) 2002-03-22 2005-08-23 International Business Machines Corporation Centralized mapping of security credentials for database access operations
US6941350B1 (en) 2000-10-19 2005-09-06 International Business Machines Corporation Method and apparatus for reliably choosing a master network manager during initialization of a network computing system
US6978300B1 (en) 2000-10-19 2005-12-20 International Business Machines Corporation Method and apparatus to perform fabric management
US6981025B1 (en) 2000-10-19 2005-12-27 International Business Machines Corporation Method and apparatus for ensuring scalable mastership during initialization of a system area network
US6990528B1 (en) 2000-10-19 2006-01-24 International Business Machines Corporation System area network of end-to-end context via reliable datagram domains
US20060064754A1 (en) * 2004-02-13 2006-03-23 Microsoft Corporation Distributed network security service
US20060095965A1 (en) * 2004-10-29 2006-05-04 Microsoft Corporation Network security device and method for protecting a computing device in a networked environment
US7055042B1 (en) * 1999-03-25 2006-05-30 Electronics Data Systems Corporation System and method for synchronizing a user password between mainframe and alternative computer operating environments
US7099955B1 (en) 2000-10-19 2006-08-29 International Business Machines Corporation End node partitioning using LMC for a system area network
US7100207B1 (en) 2001-06-14 2006-08-29 International Business Machines Corporation Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information
US7113995B1 (en) * 2000-10-19 2006-09-26 International Business Machines Corporation Method and apparatus for reporting unauthorized attempts to access nodes in a network computing system
US7143437B2 (en) 2001-01-12 2006-11-28 Siemens Medical Solutions Health Services Corporation System and user interface for managing user access to network compatible applications
US20070011286A1 (en) * 2003-06-26 2007-01-11 Marian Trinkel Method and System for Increasing the Switching Capacity in Telecommunications Networks by Transmission or Activation of Software
US7171694B1 (en) * 1999-07-21 2007-01-30 E-Payments Method for performing a transaction over a network
US20070214495A1 (en) * 2001-01-12 2007-09-13 Siemens Medical Solutions Usa, Inc. System and User Interface Supporting Context Sharing Between Concurrently Operating Applications
US20070217409A1 (en) * 2006-03-20 2007-09-20 Mann Eric K Tagging network I/O transactions in a virtual machine run-time environment
US20080060055A1 (en) * 2006-08-29 2008-03-06 Netli, Inc. System and method for client-side authenticaton for secure internet communications
US20080059619A1 (en) * 2006-08-31 2008-03-06 Microsoft Corporation Configuring a Perimeter Network
US7349949B1 (en) 2002-12-26 2008-03-25 International Business Machines Corporation System and method for facilitating development of a customizable portlet
US20080077796A1 (en) * 2006-09-27 2008-03-27 Craig Lund System and method for facilitating secure online transactions
US7359982B1 (en) 2002-12-26 2008-04-15 International Business Machines Corporation System and method for facilitating access to content information
US20080134311A1 (en) * 2006-12-01 2008-06-05 Microsoft Corporation Authentication delegation based on re-verification of cryptographic evidence
US20080189777A1 (en) * 2006-07-26 2008-08-07 Arthur Deagon Application integration
US7483979B1 (en) 2001-01-16 2009-01-27 International Business Machines Corporation Method and system for virtualizing metadata between disparate systems
US7636772B1 (en) 2000-10-19 2009-12-22 International Business Machines Corporation Method and apparatus for dynamic retention of system area network management information in non-volatile store
US20100332640A1 (en) * 2007-03-07 2010-12-30 Dennis Sidney Goodrow Method and apparatus for unified view
US20110066841A1 (en) * 2009-09-14 2011-03-17 Dennis Sidney Goodrow Platform for policy-driven communication and management infrastructure
US7929689B2 (en) 2004-06-30 2011-04-19 Microsoft Corporation Call signs
US20110107106A1 (en) * 2009-11-05 2011-05-05 Kyocera Mita Corporation File-Distribution Apparatus and Recording Medium Having File-Distribution Authorization Program Recorded Therein
US8086842B2 (en) 2006-04-21 2011-12-27 Microsoft Corporation Peer-to-peer contact exchange
US8230224B2 (en) 2005-03-08 2012-07-24 International Business Machines Corporation Transmitting security data in multipart communications over a network
US8261062B2 (en) 2003-03-27 2012-09-04 Microsoft Corporation Non-cryptographic addressing
US8495157B2 (en) 2007-03-07 2013-07-23 International Business Machines Corporation Method and apparatus for distributed policy-based management and computed relevance messaging with remote attributes
US20130283362A1 (en) * 2012-04-19 2013-10-24 Microsoft Corporation Authenticating user through web extension using token based authentication scheme
US9152602B2 (en) 2007-03-07 2015-10-06 International Business Machines Corporation Mechanisms for evaluating relevance of information to a managed device and performing management operations using a pseudo-agent
US20160261587A1 (en) * 2012-03-23 2016-09-08 Cloudpath Networks, Inc. System and method for providing a certificate for network access
US11443293B2 (en) * 2013-12-10 2022-09-13 China Unionpay Co., Ltd. Secure network accessing method for POS terminal, and system thereof
US11632415B2 (en) 2004-03-23 2023-04-18 Ioengine, Llc Apparatus, method and system for a tunneling client access point

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4471216A (en) * 1979-11-09 1984-09-11 Compagnie Internationale Pour L'informatique Cii-Honeywell Bull (Societe Anonyme System and process for identification of persons requesting access to particular facilities
US5005200A (en) * 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5534855A (en) * 1992-07-20 1996-07-09 Digital Equipment Corporation Method and system for certificate based alias detection
US5757920A (en) * 1994-07-18 1998-05-26 Microsoft Corporation Logon certification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4471216A (en) * 1979-11-09 1984-09-11 Compagnie Internationale Pour L'informatique Cii-Honeywell Bull (Societe Anonyme System and process for identification of persons requesting access to particular facilities
US5005200A (en) * 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5534855A (en) * 1992-07-20 1996-07-09 Digital Equipment Corporation Method and system for certificate based alias detection
US5757920A (en) * 1994-07-18 1998-05-26 Microsoft Corporation Logon certification

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Arnett et al, Inside TCP/IP, Second Edition, 1995, pp. 45 47. *
Arnett et al, Inside TCP/IP, Second Edition, 1995, pp. 45-47.
ITU T, X.509, Nov. 1993, pp. iii, 1, 3, 6, 13 and 14. *
ITU-T, X.509, Nov. 1993, pp. iii, 1, 3, 6, 13 and 14.
Transport Layer Security Working Group, The SSL Protocol Version 3.0 (Internet Draft). *

Cited By (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020032860A1 (en) * 1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature
US7519821B2 (en) 1998-11-09 2009-04-14 First Data Corporation Account authority digital signature (AADS) system
US7549050B2 (en) 1998-11-09 2009-06-16 First Data Corporation Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system
US8620814B2 (en) * 1998-11-09 2013-12-31 First Data Corporation Three party account authority digital signature (AADS) system
US20020112160A2 (en) * 1998-11-09 2002-08-15 First Data Dorporation Three Party Account Authority Digital Signature (AADS) System
US6438550B1 (en) * 1998-12-10 2002-08-20 International Business Machines Corporation Method and apparatus for client authentication and application configuration via smart cards
US7055042B1 (en) * 1999-03-25 2006-05-30 Electronics Data Systems Corporation System and method for synchronizing a user password between mainframe and alternative computer operating environments
US6826603B1 (en) * 1999-07-01 2004-11-30 International Business Machines Corporation Method and system for automatically configuring Telnet 3270 clients in an internet protocol network
US7171694B1 (en) * 1999-07-21 2007-01-30 E-Payments Method for performing a transaction over a network
USRE43440E1 (en) 1999-07-21 2012-05-29 Wispo Software Limited Liability Company Method for performing a transaction over a network
US6427209B1 (en) * 1999-10-19 2002-07-30 Microsoft Corporation System and method of user logon in combination with user authentication for network access
US6401211B1 (en) 1999-10-19 2002-06-04 Microsoft Corporation System and method of user logon in combination with user authentication for network access
US6865671B1 (en) * 2000-04-07 2005-03-08 Sendmail, Inc. Electronic mail system with authentication methodology for supporting relaying in a message transfer agent
US20020010861A1 (en) * 2000-04-26 2002-01-24 Shinako Matsuyama Access control system, access control method, device, access control server, access-control-server registration server, data processing apparatus, and program storage medium
US20020049605A1 (en) * 2000-05-17 2002-04-25 Nec Electronic business transaction system including server device, client device and connecting terminal used therein
US6785729B1 (en) * 2000-08-25 2004-08-31 International Business Machines Corporation System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful
US20100088504A1 (en) * 2000-08-25 2010-04-08 Research In Motion Limited System and Method for Implementing an Enhanced Transport Layer Security Protocol
US7631180B2 (en) * 2000-08-25 2009-12-08 Research In Motion Limited System and method for implementing an enhanced transport layer security protocol
US20030159029A1 (en) * 2000-08-25 2003-08-21 Brown Michael S. System and method for implementing an enhanced transport layer security protocol
US8145896B2 (en) 2000-08-25 2012-03-27 Research In Motion Limited System and method for implementing an enhanced transport layer security protocol
US6981025B1 (en) 2000-10-19 2005-12-27 International Business Machines Corporation Method and apparatus for ensuring scalable mastership during initialization of a system area network
US7636772B1 (en) 2000-10-19 2009-12-22 International Business Machines Corporation Method and apparatus for dynamic retention of system area network management information in non-volatile store
US7113995B1 (en) * 2000-10-19 2006-09-26 International Business Machines Corporation Method and apparatus for reporting unauthorized attempts to access nodes in a network computing system
US7099955B1 (en) 2000-10-19 2006-08-29 International Business Machines Corporation End node partitioning using LMC for a system area network
US6941350B1 (en) 2000-10-19 2005-09-06 International Business Machines Corporation Method and apparatus for reliably choosing a master network manager during initialization of a network computing system
US6978300B1 (en) 2000-10-19 2005-12-20 International Business Machines Corporation Method and apparatus to perform fabric management
US6990528B1 (en) 2000-10-19 2006-01-24 International Business Machines Corporation System area network of end-to-end context via reliable datagram domains
US20020059531A1 (en) * 2000-11-16 2002-05-16 Lai On Warren Kwan Integrated tracking of multi-authentication among web services
US20020073257A1 (en) * 2000-12-07 2002-06-13 Ibm Corporation Transferring foreign protocols across a system area network
US7849498B2 (en) 2001-01-12 2010-12-07 Siemens Medical Solutions Usa, Inc. System and user interface supporting context sharing between concurrently operating applications
US20060161973A1 (en) * 2001-01-12 2006-07-20 Royer Barry L System and user interface supporting concurrent application initiation and interoperability
US7143437B2 (en) 2001-01-12 2006-11-28 Siemens Medical Solutions Health Services Corporation System and user interface for managing user access to network compatible applications
US20020095584A1 (en) * 2001-01-12 2002-07-18 Royer Barry Lynn System and user interface supporting concurrent application initiation and interoperability
US20070214495A1 (en) * 2001-01-12 2007-09-13 Siemens Medical Solutions Usa, Inc. System and User Interface Supporting Context Sharing Between Concurrently Operating Applications
US7043752B2 (en) 2001-01-12 2006-05-09 Siemens Medical Solutions Health Services Corporation System and user interface supporting concurrent application initiation and interoperability
US7483979B1 (en) 2001-01-16 2009-01-27 International Business Machines Corporation Method and system for virtualizing metadata between disparate systems
US7089311B2 (en) * 2001-01-31 2006-08-08 International Business Machines Corporation Methods, systems and computer program products for resuming SNA application-client communications after loss of an IP network connection
US20020103909A1 (en) * 2001-01-31 2002-08-01 Devine Wesley Mcmillan Methods, systems and computer program products for resuming SNA application-client communications after loss of an IP network connection
US7100207B1 (en) 2001-06-14 2006-08-29 International Business Machines Corporation Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information
US7562387B2 (en) 2001-09-07 2009-07-14 International Business Machines Corporation Method and apparatus for selective disabling of tracking of click stream data
US20030051157A1 (en) * 2001-09-07 2003-03-13 Nguyen Bing Quang Method and apparatus for selective disabling of tracking of click stream data
US6934706B1 (en) 2002-03-22 2005-08-23 International Business Machines Corporation Centralized mapping of security credentials for database access operations
US8499339B2 (en) 2002-08-28 2013-07-30 International Business Machines Corporation Authenticating and communicating verifiable authorization between disparate network domains
US20040054898A1 (en) * 2002-08-28 2004-03-18 International Business Machines Corporation Authenticating and communicating verifiable authorization between disparate network domains
US20070289004A1 (en) * 2002-08-28 2007-12-13 International Business Machines Corporation Authenticated and communicating verifiable authorization between disparate network domains
US20080162499A1 (en) * 2002-12-26 2008-07-03 International Business Machines Corporation System and Method for Facilitating Access to Content Information
US7349949B1 (en) 2002-12-26 2008-03-25 International Business Machines Corporation System and method for facilitating development of a customizable portlet
US7359982B1 (en) 2002-12-26 2008-04-15 International Business Machines Corporation System and method for facilitating access to content information
US7543140B2 (en) * 2003-02-26 2009-06-02 Microsoft Corporation Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority
US20040168056A1 (en) * 2003-02-26 2004-08-26 Microsoft Corporation Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority
US8261062B2 (en) 2003-03-27 2012-09-04 Microsoft Corporation Non-cryptographic addressing
US20050005133A1 (en) * 2003-04-24 2005-01-06 Xia Sharon Hong Proxy server security token authorization
US7836493B2 (en) * 2003-04-24 2010-11-16 Attachmate Corporation Proxy server security token authorization
US7489783B2 (en) 2003-06-25 2009-02-10 Ricoh Company, Ltd. Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
US20050033957A1 (en) * 2003-06-25 2005-02-10 Tomoaki Enokida Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
US6981139B2 (en) * 2003-06-25 2005-12-27 Ricoh Company, Ltd. Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
US20060036850A1 (en) * 2003-06-25 2006-02-16 Tomoaki Enokida Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
US8345708B2 (en) * 2003-06-26 2013-01-01 Deutsche Telekom Ag Method and system for increasing the switching capacity in telecommunications networks by transmission or activation of software
US20070011286A1 (en) * 2003-06-26 2007-01-11 Marian Trinkel Method and System for Increasing the Switching Capacity in Telecommunications Networks by Transmission or Activation of Software
US20040268152A1 (en) * 2003-06-27 2004-12-30 Wrq, Inc. Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
US8214884B2 (en) 2003-06-27 2012-07-03 Attachmate Corporation Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
US20050039008A1 (en) * 2003-08-05 2005-02-17 Gaurav Bhatia Method and apparatus for end-to-end identity propagation
US20070199056A1 (en) * 2003-08-05 2007-08-23 Gaurav Bhatia Method and apparatus for end-to-end identity propagation
US7913298B2 (en) 2003-08-05 2011-03-22 Oracle International Corporation Method and apparatus for end-to-end identity propagation
US7249375B2 (en) * 2003-08-05 2007-07-24 Oracle International Corp Method and apparatus for end-to-end identity propagation
US20050177715A1 (en) * 2004-02-09 2005-08-11 Microsoft Corporation Method and system for managing identities in a peer-to-peer networking environment
US20050182949A1 (en) * 2004-02-13 2005-08-18 Microsoft Corporation System and method for securing a computer system connected to a network from attacks
US20050183138A1 (en) * 2004-02-13 2005-08-18 Microsoft Corporation System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
US7716726B2 (en) 2004-02-13 2010-05-11 Microsoft Corporation System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
US7814543B2 (en) 2004-02-13 2010-10-12 Microsoft Corporation System and method for securing a computer system connected to a network from attacks
US7603716B2 (en) 2004-02-13 2009-10-13 Microsoft Corporation Distributed network security service
US20060064754A1 (en) * 2004-02-13 2006-03-23 Microsoft Corporation Distributed network security service
US9294377B2 (en) 2004-03-19 2016-03-22 International Business Machines Corporation Content-based user interface, apparatus and method
US11818195B1 (en) 2004-03-23 2023-11-14 Ioengine, Llc Apparatus, method and system for a tunneling client access point
US11818194B2 (en) 2004-03-23 2023-11-14 Ioengine, Llc Apparatus, method and system for a tunneling client access point
US11632415B2 (en) 2004-03-23 2023-04-18 Ioengine, Llc Apparatus, method and system for a tunneling client access point
US7929689B2 (en) 2004-06-30 2011-04-19 Microsoft Corporation Call signs
US20060095965A1 (en) * 2004-10-29 2006-05-04 Microsoft Corporation Network security device and method for protecting a computing device in a networked environment
US7716727B2 (en) 2004-10-29 2010-05-11 Microsoft Corporation Network security device and method for protecting a computing device in a networked environment
US8230224B2 (en) 2005-03-08 2012-07-24 International Business Machines Corporation Transmitting security data in multipart communications over a network
US8295275B2 (en) * 2006-03-20 2012-10-23 Intel Corporation Tagging network I/O transactions in a virtual machine run-time environment
US20070217409A1 (en) * 2006-03-20 2007-09-20 Mann Eric K Tagging network I/O transactions in a virtual machine run-time environment
US8086842B2 (en) 2006-04-21 2011-12-27 Microsoft Corporation Peer-to-peer contact exchange
US20080189777A1 (en) * 2006-07-26 2008-08-07 Arthur Deagon Application integration
US8925052B2 (en) * 2006-07-26 2014-12-30 At&T Intellectual Property I, L.P. Application integration
US20120204025A1 (en) * 2006-08-29 2012-08-09 Akamai Technologies, Inc. System and method for client-side authentication for secure internet communications
US8560834B2 (en) * 2006-08-29 2013-10-15 Akamai Technologies, Inc. System and method for client-side authentication for secure internet communications
US20080060055A1 (en) * 2006-08-29 2008-03-06 Netli, Inc. System and method for client-side authenticaton for secure internet communications
US8181227B2 (en) * 2006-08-29 2012-05-15 Akamai Technologies, Inc. System and method for client-side authenticaton for secure internet communications
US20080059619A1 (en) * 2006-08-31 2008-03-06 Microsoft Corporation Configuring a Perimeter Network
US8327142B2 (en) * 2006-09-27 2012-12-04 Secureauth Corporation System and method for facilitating secure online transactions
US20080077796A1 (en) * 2006-09-27 2008-03-27 Craig Lund System and method for facilitating secure online transactions
US9900163B2 (en) 2006-09-27 2018-02-20 Secureauth Corporation Facilitating secure online transactions
US8700901B2 (en) 2006-09-27 2014-04-15 Secureauth Corporation Facilitating secure online transactions
US9294288B2 (en) 2006-09-27 2016-03-22 Secureauth Corporation Facilitating secure online transactions
US9055107B2 (en) 2006-12-01 2015-06-09 Microsoft Technology Licensing, Llc Authentication delegation based on re-verification of cryptographic evidence
US20080134311A1 (en) * 2006-12-01 2008-06-05 Microsoft Corporation Authentication delegation based on re-verification of cryptographic evidence
US20100332640A1 (en) * 2007-03-07 2010-12-30 Dennis Sidney Goodrow Method and apparatus for unified view
US9152602B2 (en) 2007-03-07 2015-10-06 International Business Machines Corporation Mechanisms for evaluating relevance of information to a managed device and performing management operations using a pseudo-agent
US8495157B2 (en) 2007-03-07 2013-07-23 International Business Machines Corporation Method and apparatus for distributed policy-based management and computed relevance messaging with remote attributes
US8966110B2 (en) 2009-09-14 2015-02-24 International Business Machines Corporation Dynamic bandwidth throttling
US20110066841A1 (en) * 2009-09-14 2011-03-17 Dennis Sidney Goodrow Platform for policy-driven communication and management infrastructure
US8732848B2 (en) * 2009-11-05 2014-05-20 Kyocera Document Solutions Inc. File-distribution apparatus and recording medium having file-distribution authorization program recorded therein
US20110107106A1 (en) * 2009-11-05 2011-05-05 Kyocera Mita Corporation File-Distribution Apparatus and Recording Medium Having File-Distribution Authorization Program Recorded Therein
US20160261587A1 (en) * 2012-03-23 2016-09-08 Cloudpath Networks, Inc. System and method for providing a certificate for network access
US9825936B2 (en) * 2012-03-23 2017-11-21 Cloudpath Networks, Inc. System and method for providing a certificate for network access
US8898764B2 (en) * 2012-04-19 2014-11-25 Microsoft Corporation Authenticating user through web extension using token based authentication scheme
US20130283362A1 (en) * 2012-04-19 2013-10-24 Microsoft Corporation Authenticating user through web extension using token based authentication scheme
US11443293B2 (en) * 2013-12-10 2022-09-13 China Unionpay Co., Ltd. Secure network accessing method for POS terminal, and system thereof

Similar Documents

Publication Publication Date Title
US6128738A (en) Certificate based security in SNA data flows
US6438550B1 (en) Method and apparatus for client authentication and application configuration via smart cards
US7032110B1 (en) PKI-based client/server authentication
US7366900B2 (en) Platform-neutral system and method for providing secure remote operations over an insecure computer network
US7496755B2 (en) Method and system for a single-sign-on operation providing grid access and network access
US6668322B1 (en) Access management system and method employing secure credentials
US7657531B2 (en) Systems and methods for state-less authentication
US7062781B2 (en) Method for providing simultaneous parallel secure command execution on multiple remote hosts
US8892755B2 (en) System and method for single sign-on session management without central server
US8499339B2 (en) Authenticating and communicating verifiable authorization between disparate network domains
US8340283B2 (en) Method and system for a PKI-based delegation process
US7627896B2 (en) Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US7698736B2 (en) Secure delegation using public key authentication
US7774612B1 (en) Method and system for single signon for multiple remote sites of a computer network
US20060294366A1 (en) Method and system for establishing a secure connection based on an attribute certificate having user credentials
US20030065956A1 (en) Challenge-response data communication protocol
EP1249983A2 (en) Methods and arrangements for protecting information in forwarded authentication messages
US20070143829A1 (en) Authentication of a principal in a federation
JP2001229078A (en) Authorization infrastructure based on public key cryptography
US7287156B2 (en) Methods, systems and computer program products for authentication between clients and servers using differing authentication protocols
Nongbri et al. A survey on single sign-on
Muftic et al. Security architecture for distributed systems
Yeh et al. Applying lightweight directory access protocol service on session certification authority
Simpson et al. Claims-based authentication for a web-based enterprise
Saito et al. Privacy-enhanced access control by SPKI and its application to Web server

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DOYLE, RONALD PATRICK;HIND, JOHN RAITHEL;KING, JULIE HAYES;REEL/FRAME:009148/0151;SIGNING DATES FROM 19980421 TO 19980422

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20081003